Device for quantifying vulnerability of system and method therefor

a vulnerability and system technology, applied in the field of apparatus and methods for quantifying the vulnerability of systems, can solve the problems of difficult to represent the state of the system using a representative value, system is in a dangerous state, and cannot disclose the technology for acquiring the results of intuitively or objectively evaluating vulnerability, etc., to achieve the effect of reducing the involvement of the subjectivity of the evaluator and composite scores

Active Publication Date: 2016-02-25
ELECTRONICS & TELECOMM RES INST
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0024]According to the present invention, the apparatus and method for quantifying the vulnerability of a system can minimize the involvement of the subjectivity of an evaluator, thereby overcoming the problem that evaluation results vary depending on the evaluator.
[0025]Furthermore, the apparatus and method for quantifying the vulnerability of a system can provide a system administrator with intuitive and objective results, such as the result statement “if a specific protective measure is taken, the composite score can be increased by specific points.”

Problems solved by technology

However, this conventional technology for analyzing or evaluating vulnerability provides merely an active and automated integrated cyber attack model that is capable of detecting and analyzing the vulnerability of a network or a system, but does not disclose technology for acquiring the results of intuitively or objectively evaluating vulnerability.
Meanwhile, if the results of analyzing or evaluating the vulnerability of a system are not quantified, it is difficult to represent the state of the system using a representative value.
For example, the result statement “a specific system is in a dangerous state because access control is insufficient because of lack of password management and the presence of an unnecessary service” may make a user confused.
Although it is definitely necessary to analyze or evaluate vulnerability, related research and development has not been sufficiently carried out.
Although the results of analyzing or evaluating vulnerability have been quantified using specific methods, the objectivity thereof cannot be accomplished.
A first reason for this is that the types of vulnerability that are used to calculate the score are limited.
A second reason for this is that the subjectivity of an analyzer is excessively involved.
Due to the above-described problems, the results of analyzing or evaluating vulnerability have low objectivity, and the analyzer cannot help modifying the results because of lack of a logical basis upon which the analyzer can refute the request to modify the results.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029]The present invention will be described in detail below with reference to the accompanying drawings. Repeated descriptions and descriptions of known functions and configurations which have been deemed to make the gist of the present invention unnecessarily vague will be omitted below. The embodiments of the present invention are intended to fully describe the present invention to a person having ordinary knowledge in the art. Accordingly, the shapes, sizes, etc. of elements in the drawings may be exaggerated to make the description clear.

[0030]An apparatus and method for quantifying the vulnerability of a system according to embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0031]FIG. 1 is a diagram schematically illustrating the configuration of an apparatus 100 for quantifying the vulnerability of a system according to an embodiment of the present invention. FIGS. 2 to 4 are reference diagrams that are applied ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and apparatus for quantifying the vulnerability of a system. The apparatus includes a vulnerability calculation unit, a target organization security level calculation unit, a network separation status calculation unit, an interim calculation unit, and a final score calculation unit. The vulnerability calculation unit converts each of the vulnerability identification results of the system into a vulnerability score. The target organization security level calculation unit calculates a target organization security level score based on a technology-field security level score and a management-field security level score. The network separation status calculation unit converts the status of the separation of the local network of the system into a network separation score. The interim calculation unit calculates an interim score. The final score calculation unit quantifies the vulnerability of the system by finally calculating a composite score using the interim score and a simulated intrusion success level.

Description

TECHNICAL FIELD[0001]The present invention relates, in general, to an apparatus and method for quantifying the vulnerability of a system and, more particularly, to an apparatus and method that quantify the vulnerability of a system in order to intuitively and objectively represent the state of the system.BACKGROUND ART[0002]Technology for analyzing and evaluating the vulnerability of information and communication systems is intended to previously identify vulnerabilities that exist in the corresponding system and eliminate the vulnerabilities based on the results of the identification. Accordingly, technology for analyzing and evaluating the vulnerability of information and communication systems enables vulnerabilities to be eliminated before being exploited for illegitimate intrusions, thereby preventing various types of intrusions from occurring. Furthermore, the results of analyzing or evaluating the vulnerability of a system are used for a method of intuitively transferring the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G06F17/50
CPCH04L63/1433G06F17/5009H04L63/10G06F21/577G06F21/57G06F21/56G06F30/20
Inventor MAENG, YOUNG-JAELEE, JONG-HUPARK, HYUN-DONGPARK, SANG-WOOPARK, EUNG-KI
Owner ELECTRONICS & TELECOMM RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products